Will NSA & CyberCom Split?

Talk of separating the National Security Agency and US Cyber Command continues to pop up, as officials discuss the best path forward for agencies with different but related missions.

The Obama administration's top defense and intelligence officials are proposing a plan to separate the spying and war fighting arms of America's vast hacking apparatus, an idea that was recommended, but rejected after the Edward Snowden revelations of 2013.

Defense Secretary Ash Carter and Director of National Intelligence James Clapper both support a proposal to separate NSA from CYBERCOM, but both declined to comment for the record.

The agencies currently share the same leader, Adm. Mike Rogers, and headquarters space at Fort Meade, Maryland. But their missions differ: NSA focuses on intelligence while CYBERCOM conducts military cyberspace operations.

“While USCYBERCOM resides with NSA, the two organizations are distinct entities with separate missions, authorities and resource streams,” said Rogers in written testimony for an April 5 Senate Armed Services Committee hearing. “Neither is an arm of the other, and both perform vital tasks on behalf of our nation.”

Adm. Mike Rogers wears two hats.

Rogers at the hearing said he supported elevating CYBERCOM to a unified combatant command, which “would allow us to be faster, which would generate better mission outcomes.” He, however, warned against taking control of CYBERCOM away from the NSA chief at this time, in part because of the command’s reliance on NSA systems.

Senior military leaders have served as NSA director since the agency’s founding in 1952. According to NBC News, future directors would be four-star generals or the equivalent, a higher rank than currently leads the agency. An earlier Reuters report said future directors could be civilians to show NSA doesn’t report to CYBERCOM.

“Following a thorough interagency review, the administration has decided that keeping the positions of NSA director and Cyber Command commander together as one, dual-hatted position is the most effective approach to accomplishing both agencies’ missions,” White House’s National Security Council spokeswoman Caitlin Hayden said.


DefenseOne:       ABC

 

« Delete Google Maps But They'll Still Track You
Uber Starts Self Driving Taxis »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

MNCERT/CC

MNCERT/CC

MNCERT/CC is the national Computer Emergency Response Team for Mongolia.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.